Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
Xiaoping WangMuhammad WaqasShanshan TuSadaqat ur RehmanRidha SouaObaid Ur RehmanSajid AnwarWei ZhaoPublished in: IET Commun. (2020)
Keyphrases
- physical layer
- wireless communication
- secret key
- wireless networks
- communication networks
- computer simulation
- wireless sensor networks
- smart card
- wireless channels
- wifi
- signature scheme
- power consumption
- key management
- cognitive radio
- end to end
- fading channels
- hash functions
- security issues
- data transmission
- information security
- sensor nodes
- access control